BUG BOUNTY: BYPASSING WAF TO GET LFI (REAL TARGET) | 10K SPECIAL | 2023

  Рет қаралды 11,488

BePractical

BePractical

Күн бұрын

Пікірлер: 34
@mandikgoyal7740
@mandikgoyal7740 11 ай бұрын
Very Informative Videos Keep up the good work
@Th3-Noob-Audit0rs
@Th3-Noob-Audit0rs 11 ай бұрын
❤ hope your video's bypass KZbin guidelines also
@BanglaEdition24
@BanglaEdition24 11 ай бұрын
😂
@FAHADKHATRI12
@FAHADKHATRI12 11 ай бұрын
This is valuable information!
@морс-ф3д
@морс-ф3д 11 ай бұрын
Congratulation on you 10000 subs!!!) You deserve MORE!!!!
@Deepakkumar-pm2kt
@Deepakkumar-pm2kt 11 ай бұрын
Loved the video man. Learnt a lot from how your explanations.
@Fractal_reComm
@Fractal_reComm 4 ай бұрын
Dude, I'm a big fan and I admire and inspire me, your work, I would like you to help me find simpler sites like this. Generally, my targets are very well protected, but it's possible to overcome them. them and this takes much more time than in simpler systems, I have little experience but I have already found some cool vulnerabilities, I still can't afford better education in cybersecurity, I would be very happy and I'm sure that the entire community that is also starting out would be very happy and would help a lot, thank you for everything, I hope you read it
@HunterX461
@HunterX461 11 ай бұрын
Congratulations bro for 10k fam ❤🎉Next milestone is of 50k subs😊
@abduls4479
@abduls4479 11 ай бұрын
Awesome video.. thanks man
@islamkafafy6984
@islamkafafy6984 11 ай бұрын
Wow Dude you are amazing keep uploading top tier videos more
@zahiruddinahmad55
@zahiruddinahmad55 11 ай бұрын
Please make a video 403/404 bypass
@ReligionAndMaterialismDebunked
@ReligionAndMaterialismDebunked 11 ай бұрын
Yeee. More of these would be awesome. Hehe. I know we can add hostname:3000, and some stuff like that.
@imran_hossain123
@imran_hossain123 10 ай бұрын
Thanks from Bangladesh
@gauravkesharwani5557
@gauravkesharwani5557 6 ай бұрын
Great explanation bro. Many people teach if we want to check for such vulnerabilities we need to use payloads like ../../../../etc/passwd. However you shared another perspective - why to just try /etc/passwd, if we can check with other files within web root leading to source code reveal. Thanks for sharing this content
@MRIDULSG
@MRIDULSG 11 ай бұрын
I have a question regarding this. What I understand is in LFI, you can actually execute the files on the server. In this case, the index.php file shall show the output of the executed version of the index.php file instead of showing the source code. In directory traversal, we can see the content of the file. Please Correct me if I'm wrong.
@BePracticalTech
@BePracticalTech 11 ай бұрын
Actually in local file inclusion, you will be able to see the contents of files present on the server. However, there are certain scenarios where you'll be able to execute the files(like you mentioned) but it depends from target to target. The vulnerable endpoint here was actually serving the content of the pdf that's why we were able to get the content of source code. Hope you understood
@hamzaannane885
@hamzaannane885 11 ай бұрын
From 10k to 100k 🎉🎉🎉 one day
@hackingstudy-g5h
@hackingstudy-g5h 11 ай бұрын
you amazing man, thanks for the effort, you really work hard to give us the best content, and we appreciate it.
@BePracticalTech
@BePracticalTech 11 ай бұрын
Thank you
@akashpatel-bs8ve
@akashpatel-bs8ve 11 ай бұрын
Nice information, jump to 4:00 to main content 👍
@ReligionAndMaterialismDebunked
@ReligionAndMaterialismDebunked 11 ай бұрын
Early crew. :3
@medamine6745
@medamine6745 7 күн бұрын
you haven't bypass the WAF, did you get /etc/passwd ? nope !
@mnoobb69
@mnoobb69 2 ай бұрын
Where are you from bro?
@BePracticalTech
@BePracticalTech 2 ай бұрын
India
@tanvirmridha
@tanvirmridha 11 ай бұрын
😮
@TechAmbition
@TechAmbition 6 ай бұрын
Bro targeting real host *Only for educational purposes 😅
@hamzaannane885
@hamzaannane885 11 ай бұрын
Keep going 🎉🎉🎉 u are the best
@Be_Buddhaa
@Be_Buddhaa 11 ай бұрын
How many programming languages do you know?😢
@BePracticalTech
@BePracticalTech 11 ай бұрын
I know few programming languages
@Be_Buddhaa
@Be_Buddhaa 11 ай бұрын
@@BePracticalTech name please ?🥵🔥
@oswardgaming3223
@oswardgaming3223 11 ай бұрын
Bro i am new in bug hunting so suggest me the right path for bug hunting
@BePracticalTech
@BePracticalTech 11 ай бұрын
Join our telegram community: telegram.me/bepracticaltech
This Bug Got Me A $30,000 Bounty
12:41
NahamSec
Рет қаралды 13 М.
How I Turned a Lolipop Into A New One 🤯🍭
00:19
Wian
Рет қаралды 11 МЛН
Watermelon magic box! #shorts by Leisi Crazy
00:20
Leisi Crazy
Рет қаралды 118 МЛН
BUG BOUNTY: SERVER SIDE REQUEST FORGERY | LIVE WEBSITE | 2023
21:57
Bypassing a WAF by Finding the Origin IP
14:42
Lupin
Рет қаралды 23 М.
h@cktivitycon 2020: WAF Bypass In Depth
25:34
HackerOne
Рет қаралды 16 М.
3 Proven Techniques to Get Your Bug Bounty Report Accepted!
8:42
BePractical
Рет қаралды 2,6 М.
Web Application Firewall Bypassing by Khalil Bijjou
37:26
DATA MINER
Рет қаралды 10 М.